Floating-Point Homomorphic Encryption
暂无分享,去创建一个
Jung Hee Cheon | Andrey Kim | Miran Kim | Yong Soo Song | J. Cheon | Miran Kim | Yongsoo Song | Andrey Kim
[1] Jean-Sébastien Coron,et al. Scale-Invariant Fully Homomorphic Encryption over the Integers , 2014, Public Key Cryptography.
[2] Michael Naehrig,et al. Manual for Using Homomorphic Encryption for Bioinformatics , 2017, Proceedings of the IEEE.
[3] David Cash,et al. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems , 2009, CRYPTO.
[4] Chris Peikert,et al. Public-key cryptosystems from the worst-case shortest vector problem: extended abstract , 2009, STOC '09.
[5] Mei Han An,et al. accuracy and stability of numerical algorithms , 1991 .
[6] Heribert Vollmer,et al. Introduction to Circuit Complexity: A Uniform Approach , 2010 .
[7] Vinod Vaikuntanathan,et al. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.
[8] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[9] Berk Sunar,et al. An Investigation of Complex Operations with Word-Size Homomorphic Encryption , 2015, IACR Cryptol. ePrint Arch..
[10] Léo Ducas,et al. FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second , 2015, EUROCRYPT.
[11] S. Halevi,et al. Design and Implementation of a Homomorphic-Encryption Library , 2012 .
[12] Craig Gentry,et al. Better Bootstrapping in Fully Homomorphic Encryption , 2012, Public Key Cryptography.
[13] Jan Camenisch,et al. Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products , 2002, CRYPTO.
[14] Tomas Toft,et al. On Secure Two-Party Integer Division , 2012, Financial Cryptography.
[15] Srinivas Vivek,et al. Fixed-Point Arithmetic in SHE Schemes , 2016, SAC.
[16] Michael Naehrig,et al. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme , 2013, IMACC.
[17] Jung Hee Cheon,et al. Fully Homomophic Encryption over the Integers Revisited , 2015, EUROCRYPT.
[18] Kristin E. Lauter,et al. Private genome analysis through homomorphic encryption , 2015, BMC Medical Informatics and Decision Making.
[19] James Hardy Wilkinson,et al. Error Analysis of Direct Methods of Matrix Inversion , 1961, JACM.
[20] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[21] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[22] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[23] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[24] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[25] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[26] Zvika Brakerski,et al. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.
[27] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[28] Boisvert,et al. Accuracy and Reliability in Scientific Computing , 2006 .
[29] Shai Halevi,et al. Bootstrapping for HElib , 2015, EUROCRYPT.
[30] Michael Naehrig,et al. Private Predictive Analysis on Encrypted Medical Data , 2014, IACR Cryptol. ePrint Arch..
[31] W. Herman,et al. A multivariate logistic regression equation to screen for diabetes: development and validation. , 2002, Diabetes care.